exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Pierre BETOUIN

Email addresspierre.betouin at security-labs.org
First Active2003-10-30
Last Active2006-10-03
Linux_Memory_Tools-0.2.tar.gz
Posted Oct 3, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

Linux Memory tools are a set of Linux tools (Python, C and ASM) which aim is to facilitate exploit development. These tools can be used to dump process memory, search for patterns and quickly find OPCODEs location addresses (instructions and mnemonics are functional but still in development). OPCODE search is possible on an instant memory snapshot or using a file dump. These tools are been quickly coded and should be considered as helpful scripts. Return addresses or shellcode locations can be found instantly.

tags | shellcode, python
systems | linux
SHA-256 | b563de74e1cda35f782a23fd14e98e36f0b0c04030335f5778d239a1c883e3e3
155022006-nokia_n70.txt
Posted Feb 25, 2006
Authored by Pierre BETOUIN | Site secuobs.com

The Bluetooth stack on Nokia N70 cellular phones is susceptible to a remote denial of service attack.

tags | exploit, remote, denial of service
SHA-256 | 88e56cf63c296d16b4bfd3dbb4bd7d0257aec42cb75ca655864e91235890c7c1
bluetooth6.c
Posted Feb 8, 2006
Authored by Pierre BETOUIN

Proof of concept exploit that resets Sony/Ericsson phones via a flaw in Bluetooth.

tags | exploit, proof of concept
SHA-256 | 69cb4697fe7ae13e375c9aafe468cf4269b76c5f26cdea0ba16392f54d714f4c
bss-0.6.tar.gz
Posted Feb 7, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

BSS (Bluetooth Stack Smasher) is a L2CAP layer fuzzer designed to assess the security of Bluetooth enabled devices by sending malicious packets.

tags | fuzzer
SHA-256 | aaba600425bcd01257183c65b4aa46278664ad27a4f671b325327a8cabb77e48
dnsa-0.6-ng.tar.gz
Posted Jul 23, 2005
Authored by Pierre BETOUIN | Site packetfactory.net

DNSA is an auditing tool which aim is to provide a simple way to pentest DNS servers and perform DNS ID Spoofing.

Changes: This new version includes wireless support using 2 cards (one monitoring, the other injecting packets).
tags | spoof
systems | unix
SHA-256 | 4492a671fe86808e05422ce270c84c0983ef784b014d88e98e3aee15d5a64ca2
DNS Auditor 0.4
Posted Oct 30, 2003
Authored by Pierre BETOUIN | Site packetfactory.net

DNS Auditor is a tool which checks for DNS security. Looks for DNS cache poisoning (using additional RR), DNS ID Spoofing, and more. More information in a related paper is available here.

tags | spoof
systems | unix
SHA-256 | 832c63102968839f32aa3a17a7cc29f67bb699940862db19e43e1130efd01dc4
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close